Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN: 9781305657458
Author: Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 12, Problem 4IR
Explanation of Solution
Java security flaws from two articles:
- As java in browser is
Operating System (OS) independent and it has the popular run-time environment in desktop browsers, java becomes more attractive target for malicious attacker. - Oracle is decided to move rapidly to fix the java flaws.
- In 2013, Oracle released a critical one-off path update to fix the issue before two weeks of the issue being actively exploited...
Explanation of Solution
Processes of informing users about the need to obtain updates to fix security holes:
- A Critical Patch Update
program is a group of patches for various security vulnerabilities where patches are a set of changes such as update, and fixing the data to a computer system. - Oracle informs the users that they need to be remains in actively supported version and apply for the Critical Patch Update program.
- Critical Patch Update program releases the patches for the product versions covered by premier support or extended support of Lifetime Support Policy...
Explanation of Solution
In the world, there are 5 to 10 billion devices have java installed.
Devices that have java installed:
- In the world, 1.1 billion desktop systems run java...
Explanation of Solution
Ways to identify whether java is installed on a computer
- If the user uses command prompt to identify the installation of java.
- After installing java, the user needs to set “PATH” variable in environmental variables.
- Then, the user types the command “java –version” in terminal.
- After running the above command, if java is installed on a computer then it shows the version of java, java Standard Edition (SE) Environment’s build and Java HotSpot client Virtual Machine’s (VM) build.
- The user can also use program that reads java system properties to identify whether it is installed or not...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
When operating systems and most other types of software are first released, they are not completely bug-free.There are applications available that contain tens of thousands of bugs.Known flaws in published software are routinely addressed by software companies through the distribution of patches (also known as patches).Hackers and other criminals frequently launch zero-day attacks the day after a new vulnerability is publicly disclosed. No one can deny that these criminals' actions are unethical, but what duty does a software company have if their negligence or haste to market causes harm to customers? What are computer users' responsibilities in terms of staying up to date on security patches?
Launch versions of operating systems and apps often include bugs. Multiple thousands of bugs have been found in popular application frameworks. When a problem is found in a piece of software, the manufacturer usually has a patch available for sale (also known as patches). The day after a new vulnerability is disclosed, criminals launch zero-day assaults. No one disputes the immorality of these criminals' actions, but what responsibility does a software firm have if its ineptitude or haste to market endangers its customers? Security fixes should be installed on a regular basis.
Identify the actions to take in order to mitigate Java and Javascript vulnerabilities.
Chapter 12 Solutions
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Ch. 12 - Prob. 1SGCh. 12 - Prob. 2SGCh. 12 - Prob. 3SGCh. 12 - Prob. 4SGCh. 12 - Prob. 5SGCh. 12 - Prob. 6SGCh. 12 - Prob. 7SGCh. 12 - Prob. 8SGCh. 12 - Prob. 9SGCh. 12 - Prob. 10SG
Ch. 12 - Prob. 11SGCh. 12 - Prob. 12SGCh. 12 - Prob. 13SGCh. 12 - Prob. 14SGCh. 12 - Prob. 15SGCh. 12 - Prob. 16SGCh. 12 - Prob. 17SGCh. 12 - Prob. 18SGCh. 12 - Prob. 19SGCh. 12 - Prob. 20SGCh. 12 - Prob. 21SGCh. 12 - Prob. 22SGCh. 12 - Prob. 23SGCh. 12 - Prob. 24SGCh. 12 - Prob. 25SGCh. 12 - Prob. 26SGCh. 12 - Prob. 27SGCh. 12 - Prob. 28SGCh. 12 - Prob. 29SGCh. 12 - Prob. 30SGCh. 12 - Prob. 31SGCh. 12 - Prob. 32SGCh. 12 - Prob. 33SGCh. 12 - Prob. 34SGCh. 12 - Prob. 35SGCh. 12 - Prob. 36SGCh. 12 - Prob. 37SGCh. 12 - Prob. 38SGCh. 12 - Prob. 39SGCh. 12 - Prob. 40SGCh. 12 - Prob. 41SGCh. 12 - Prob. 42SGCh. 12 - Prob. 43SGCh. 12 - Prob. 44SGCh. 12 - Prob. 45SGCh. 12 - Prob. 1TFCh. 12 - Prob. 2TFCh. 12 - Prob. 3TFCh. 12 - Prob. 4TFCh. 12 - Prob. 5TFCh. 12 - Prob. 6TFCh. 12 - Prob. 7TFCh. 12 - Prob. 8TFCh. 12 - Prob. 9TFCh. 12 - Prob. 10TFCh. 12 - Prob. 11TFCh. 12 - Prob. 12TFCh. 12 - Prob. 1MCCh. 12 - Prob. 2MCCh. 12 - Prob. 3MCCh. 12 - A(n) _____ report consolidates data usually with...Ch. 12 - Prob. 5MCCh. 12 - Prob. 6MCCh. 12 - Prob. 7MCCh. 12 - Prob. 8MCCh. 12 - Prob. 1MCh. 12 - Prob. 2MCh. 12 - Prob. 3MCh. 12 - Prob. 4MCh. 12 - Prob. 5MCh. 12 - Prob. 6MCh. 12 - Prob. 7MCh. 12 - Prob. 8MCh. 12 - Prob. 9MCh. 12 - Prob. 10MCh. 12 - Prob. 2CTCh. 12 - Prob. 3CTCh. 12 - Prob. 4CTCh. 12 - Prob. 5CTCh. 12 - Prob. 6CTCh. 12 - Prob. 7CTCh. 12 - Prob. 8CTCh. 12 - Prob. 9CTCh. 12 - Prob. 10CTCh. 12 - Prob. 11CTCh. 12 - Prob. 12CTCh. 12 - Prob. 13CTCh. 12 - Prob. 14CTCh. 12 - Prob. 15CTCh. 12 - Prob. 16CTCh. 12 - Prob. 17CTCh. 12 - Prob. 18CTCh. 12 - Prob. 19CTCh. 12 - Prob. 20CTCh. 12 - Prob. 21CTCh. 12 - Prob. 22CTCh. 12 - Prob. 23CTCh. 12 - Prob. 24CTCh. 12 - Prob. 25CTCh. 12 - Prob. 26CTCh. 12 - Prob. 27CTCh. 12 - Prob. 28CTCh. 12 - Prob. 29CTCh. 12 - Prob. 1PSCh. 12 - Prob. 2PSCh. 12 - Prob. 3PSCh. 12 - Prob. 4PSCh. 12 - Prob. 5PSCh. 12 - Prob. 6PSCh. 12 - Prob. 7PSCh. 12 - Prob. 8PSCh. 12 - Prob. 9PSCh. 12 - Prob. 10PSCh. 12 - Prob. 11PSCh. 12 - Prob. 1.1ECh. 12 - Prob. 1.2ECh. 12 - Prob. 1.3ECh. 12 - Prob. 2.1ECh. 12 - Prob. 2.2ECh. 12 - Prob. 3.1ECh. 12 - Prob. 3.2ECh. 12 - Prob. 1IRCh. 12 - Prob. 2IRCh. 12 - Prob. 4IRCh. 12 - Prob. 5IRCh. 12 - Prob. 1CTQCh. 12 - Prob. 3CTQCh. 12 - Prob. 4CTQ
Knowledge Booster
Similar questions
- true or false 2. More than 50 year ago, security was accomplished by using physical controls over access to the computers.arrow_forwardSeveral professionals in the field of cybersecurity believe that fingerprinting is unethical and that it violates the privacy concerns of users. A number of browsers have developed methods to avoid leaving a browser fingerprint. Browsers have made many attempts to defend themselves against fingerprint recognition using a variety of methods.arrow_forwardOperating systems and the vast majority of programmes do not begin their lives devoid of bugs. Applications have tens of thousands of bugs in them at any one time. It is common practise for software suppliers to give fixes for recognised software defects (also known as patches). Criminals often launch zero-day attacks the day after a newly discovered vulnerability is disclosed to the public. Nobody can dispute the immorality of what these criminals are doing, but a software firm has what duty to its customers if their inexperience or haste to compete in the market causes them harm? Users of computers are required to install the latest security updates.arrow_forward
- Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer. Once installed, most antivirus software runs automatically in the background to provide real-time protection against virus attacks.Comprehensive virus protection programs help protect your files and hardware from malware such as worms, Trojan horses and spyware, and may also offer additional protection such as customizable firewalls and website blocking. On same background explain how does an Antivirus system in a computer function.arrow_forwardWhat are the reasons that extensions, plug-ins, and add-ons are considered security risks?arrow_forwardA computer virus is a little piece of software that travels from one computer to another and causes problems with its functioning. A computer virus may damage or remove data on a computer, distribute the virus to other computers through email, or even wipe the hard drive clean. Computer infections are often propagated via email attachments or instant messaging conversations. As a result, you should never open an email attachment unless you know who sent it or unless you are expecting it. Viruses might be camouflaged as comical photos, greeting cards, or audio and video files in email attachments. Computer viruses may also be propagated through Internet downloads. They may be found in pirated software, as well as other files and applications that you may download. Why would designers place software inside the kernel (or make use of kernel software) if it is so dangerous? What additional strategies do you use to avoid viruses if you were an antivirus creator or maker?arrow_forward
- What does it mean for extensions, plug-ins, and add-ons to pose a security risk?arrow_forwardIdentify the signs of a virus infection. How are a computer virus, a worm, and a Trojan horse similar? How are they different? Define malware (or malicious software). Define payload. List symptoms of a computer infected by a virus, worm, or Trojan horse. Mention the four ways in which viruses deliver their payloads. How can a virus can spread through an e-mail message? Explain why malicious-logic programs are a serious problem. How long is an unprotected computer safe from intruders?arrow_forwardComputer viruses are malicious software programs that may erase data or wreak havoc on a computer's processing and memory components and are notoriously difficult to detect. They are sometimes referred to as computer trojans.Computer viruses have been connected to a wide variety of software, therefore let's talk about it.arrow_forward
- Computer Science Please use your own words Why is Identity Theft so disastrous? Who does it affect? Have you ever been a victim or do you know someone who was a victim of ID theft? Did they ever recover their Identity? What did they do to recover whatever was lost? How might you prevent and/or mitigate it?arrow_forwardIntellectual property is a controversial subject in some circles. Considering the amount of effort needed to produce a creative work, such as a movie or a book, and the ease with which digital media allow such things to be duplicated and transmitted for little to practically no cost, an entire industry has been built up around copy protection. One copy piece of copy protection software interfered with the functioning of a computer’s CD/DVD writer, slowing it down significantly and in many cases preventing it from working. The copy protection software producer felt that the measure was justified, claiming that DVD writers were only used to produce illegal copies of commercial works. Discuss with your classmates the technical and ethical challenges in protecting intellectual property in the digital age.arrow_forwardWrite down about software types with example freeware Shareware Malware Spywarearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education